ModSecurity is an open-source web application firewall (WAF) that helps to protect your web applications from various types of attacks. It can be integrated with the Apache web server as a module to provide additional security for your website. In this tutorial, we will show you how to install the ModSecurity Apache module on a ..
Category : Security
ModSecurity is an open-source web application firewall (WAF) that helps to protect your web applications from various types of attacks. It can be integrated with the Apache and Debian web server as a module to provide additional security for your website. In this tutorial, we will show you how to install the ModSecurity Apache module ..
HTTP authentication is a simple and secure way to protect sensitive content from unauthorized users. This article will show you how to set up basic HTTP authentication on an NGINX server running on Ubuntu and CentOS. Prerequisites An Ubuntu 16.04, 18.04, 20.04 or 22.04 LTS / CentOS version 6, 7 or 8 server with a ..
Apache is the most popular web server and most widely used web server in the world. It provides many powerful features including dynamically loadable modules, robust media support, and extensive integration with other popular software. In this guide, we will demonstrate how to setup a password authentication on an Apache web server configured on Ubuntu ..
Introduction Iptables is a powerful Linux utility that allows system administrators to configure the kernel’s built-in firewall. Iptables uses a set of rules to determine how to filter network traffic. Each rule specifies what type of traffic to filter and what action to take on matching traffic. In this guide, we will discuss some basic ..
Introduction Although many users require a database management system like MySQL’s functionality, they might not feel at ease interacting with the system only through the MySQL command line client. To enable user interaction with MySQL via a web interface, PhpMyAdmin was developed. We’ll go over installing and securing PhpMyAdmin in this guide, so you can ..
Introduction Although many users require a database management system like MySQL’s functionality, they might not feel at ease interacting with the system only through the MySQL command line client. To enable user interaction with MySQL via a web interface, PhpMyAdmin was developed. We’ll go over installing and securing PhpMyAdmin in this guide, so you can ..
Many websites and applications begin with the web server and database backend running on the same machine. A setup like this, on the other hand, can become complicated and challenging to scale over time. The solution is to separate these functions and establishing a remote database. Permitting the server and database to grow independently on ..
Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host, or between two remote hosts. It is based on the Secure Shell (SSH) protocol. “SCP” commonly refers to both the Secure Copy Protocol and the program itself. Step 1 : Install SCP On Mac and Linux, the SCP command is pre-installed, so no ..
What is SSH? The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. An SSH client programme is typically used for establishing connections to an SSH daemon accepting remote connections. Both are commonly present on most modern operating systems, including macOS, Linux, OpenBSD, FreeBSD… In this guide, you will secure the SSH port and disable the root ..